Software copyright protection and management method based on combined public key identity authentication technology

A technology of identification authentication and management method, which is applied in the field of software copyright protection management based on CPK identification authentication technology, and can solve the problems of insufficient processing capacity, limited running speed of protected software, weak communication part, etc.

Inactive Publication Date: 2015-09-09
成都腾甲数据服务有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The commonly used software copyright protection methods based on dongles are mainly implemented based on the query-response method. Although the software copyright protection can be realized in this method, there are the following problems: first, the dongle is limited by the size and Cost and other limitations, the processing power is far less than the computer where the protected software is located, thus limiting the running speed of the p

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software copyright protection and management method based on combined public key identity authentication technology
  • Software copyright protection and management method based on combined public key identity authentication technology
  • Software copyright protection and management method based on combined public key identity authentication technology

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0026] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the following will further describe the present invention in detail with reference to the drawings in the embodiments.

[0027] Reference figure 1 As shown, a software copyright protection management method based on CPK identification authentication technology proposed by the present invention includes the following steps:

[0028] 1) When the user needs to use the protected software, open the protected software; the protected software detects whether the CPK Key device is inserted, if not inserted, an error message is displayed and waits for the user to insert the CPK Key device; if it is inserted, the user is prompted to enter the CPK Key device Start password and log in to the protected software;

[0029] 2) The CPK Key device performs local verification on the startup password entered by the user, and the verification fails, prompting an error message and requesting the u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a software copyright protection and management method based on a combined public key identity authentication technology. The method comprises: CPK Key equipment is inserted while protected software is started, and a starting password of the CPK Key equipment is input and the protected software is logged; the protected software verifies a user identifier and signature data in signature information from the CPK Key equipment, and the protected software verifies key data decoded and passed back by the CPY Key equipment after the signature information verification is passed; if the verification is passed, the protected software normally starts and operates; and when the protected software operates to a key protection point, an encrypted random number is sent to the CPK Key equipment, and the data returned by the CPY Key equipment is verified to determine whether to continuously operate the protected software. The introduced CPK Key equipment can solve the protected software copyright protection problem, and has a management function in the software use at the same time, so as to provide convenience and safety to a software user.

Description

technical field [0001] The invention relates to a software copyright protection method, in particular to a software copyright protection management method based on CPK identification authentication technology. Background technique [0002] With the development of computer technology and network information technology, software can be copied and used at will due to its digital characteristics. The problem of software copyright protection has always been an important problem that software developers need to face, and the use of dongles is one of the ways to realize software copyright protection. main means. A dongle is a hardware device connected to a computer interface (parallel port or serial port). Before the protected software is released, the software developer transplants part of the code corresponding to a certain thread in the software into the dongle, so that the protected software is During operation, the dongle connected to the computer must be invoked, and as a ha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/12
Inventor 陈谦孟俊邱银娟
Owner 成都腾甲数据服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products